Tag: Articles

  • Conversational interface helps insider threat detection

    21 mins ago Lack of visibility into endpoints poses a major issue for enterprises as IT administrators can be left in the dark about where data is and how it’s being used. This means that when data breaches occur it can take longer to detect the source. Read full news article on BetaNews  

  • UK government could imprison people for looking at terrorist content

    Not content with trying to “combat” encryption, the UK government also wants to criminalize looking at terrorist content. Read full news article on BetaNews  

  • Cyber risks are being created by departments outside IT

    2 mins ago More risks are being created by departments outside of IT, but it’s still the IT department’s problem according to a new survey. The study by identity platform SailPoint shows that 55 percent of respondents believe one of the key reasons that non-IT departments introduce the most risk is that they often lack the understanding…

  • How to properly implement identity and access management

    Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and being able to prove that all the access is legitimate. But as those heavily involved in IAM know, that is much easier said than done. Read full news article on BetaNews  

  • UK businesses have a culture of secrecy towards data breaches

    At a time when British businesses should be bolstering and updating their data protection policies in preparation for new legislation, it is worrying to report a culture of secrecy and ambivalence towards data breaches across the country. With the EU General Data Protection Regulation (GDPR) due to come into force on May 25 next year, bringing with…

  • GDPR is a set of security best practices, not a burden

    The General Data Protection Regulation (GDPR) that takes effect May 25th 2018 is still raising serious compliance concerns for most UK companies, according to a Bitdefender survey. With companies becoming more enthusiastic in deploying hybrid infrastructures that involve leveraging the capabilities of both the public and the private cloud, 85 percent of UK respondents agree encryption is…

  • 66 percent of SMBs could go out of business following a breach

    Today’s threat landscape is becoming increasingly more complex and sophisticated, And all sizes of business are at risk. VIPRE Security has released the results of a survey of 250 SMB IT managers which shows that 66 percent say they would either go out of business or shut down for a day or more if their…

  • Protecting networks from DNS exfiltration

    Everyone around the globe has heard about the colossal Equifax breach last month. Its implications haven’t yet been fully calculated except now that the CEO has resigned from his job, we know it’s serious. Read full news article on Help Net Security  

  • Google reveals why it killed NFC Smart Lock in Android

    It recently came to light that Google had killed off NFC Smart Lock in Android — without telling anyone. Now the company has come clean about just why the feature was given the chop. Read full news article on BetaNews  

  • Ransomware is reaching ‘epidemic levels’

    12 mins ago Ransomware has been named as one of the most pressing threats to society by officers at Europol. The force has released a new report which claims that ransomware is reaching “epidemic” Read full news article on BetaNews  

  • Failed updates leave Mac computers at risk from targeted attacks on firmware

    The Extensible Firmware Interface (EFI) has steadily replaced BIOS in recent years as means of booting and controlling hardware devices. Mac systems have used EFI since 2006 but an analysis by Duo Labs, the research arm of Duo Security, of more than 73,000 Mac systems finds that in many cases the EFI is not receiving…

  • Keep the Trump administration out of your private life with Tails 3.2 Linux distribution

    As we learned from the great patriot Edward Snowden, the US government can and will spy on you. Not caring about that invasion of privacy, and dismissing it with the flawed statement of “I have nothing to hide,” Read full news article on BetaNews